Nombre de documents

19

CV de KARIMA BOUDAOUD


Poster1 document

Communication dans un congrès14 documents

  • Soumya Kanti Datta, Amelie Gyrard, Christian Bonnet, Karima Boudaoud. oneM2M Architecture based User Centric IoT Application Development. FICLOUD 2015, 3rd International Conference on Future Internet of Things and Cloud, Aug 2015, Rome, Italy. <hal-01206791>
  • Soumya Kanti Datta, Amelie Gyrard, Christian Bonnet, Rui Pedro Ferreira da Costa, Karima Boudaoud. Applying Internet of Things for Personalized Healthcare in Smart Homes. WOCC 2015, 24th Wireless and Optical Communication Conference, Oct 2015, Taipei, Taiwan. <hal-01206811>
  • Soumya Kanti Datta, Amelie Gyrard, Christian Bonnet, Karima Boudaoud. A Semantic Engine for Internet of Things: Cloud, Mobile Devices and Gateways. ESIOT 2015, 4th International Workshop on Extending Seamlessly to Internet of Things, in conjunction with the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2015), Jul 2015, Blumenau, Brazil. <hal-01206822>
  • Karima Boudaoud. A User-Centric Approach for Security Management. Architects of Secure Networks (ASIGE10), NATO Science for Peace and Security, May 2015, Genova, Italy. <hal-01343995>
  • Yoann Bertrand, Mireille Blay-Fornarino, Karima Boudaoud, Michel Riveill. Generation of Transmission Control Rules Compliant with Existing Access Control Policies. Security and Privacy in Communication Networks (SECURECOMM 2015), Oct 2015, Dallas, United States. Security and Privacy in Communication Networks 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers, 2016, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. <10.1007/978-3-319-28865-9_24>. <hal-01318566>
  • Amelie Gyrard, Christian Bonnet, Karima Boudaoud. An Ontology-Based Approach for Helping to Secure the ETSI Machine-to-Machine Architecture. IEEE International Conference on Internet of Things 2014 (iThings), Sep 2014, Taipei, Taiwan. 2014. <hal-01017945>
  • Stassia Resondry, Karima Boudaoud, Michel Kamel, Yoann Bertrand, Michel Riveill. An alternative version of HTTPS to provide non-repudiation security property (A flexible component-based approach for secured transactions in a mobile environment): A flexible component-based approach for secured transactions in a mobile environment. 10th International Wireless Communications and Mobile Computing Conference (IWCMC 2014), Aug 2014, Nicosie, Cyprus. IEEE, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC) pp.536-541, <10.1109/IWCMC.2014.6906413>. <hal-01318537>
  • Amelie Gyrard, Christian Bonnet, Karima Boudaoud. The STAC (Security Toolbox: Attacks & Countermeasures) ontology. 22nd International World Wide Web Conference, Brazil, May 13-17, 2013, Companion Volume, May 2013, Rio de Janeiro, Brazil. pp.165-166, 2013. <hal-00927394>
  • Amelie Gyrard, Christian Bonnet, Karima Boudaoud. A machine-to-machine architecture to merge semantic sensor measurements. 22nd International World Wide Web Conference, Brazil, May 13-17, 2013, Companion Volume, May 2013, Rio de Janeiro, Brazil. pp.371-376, 2013. <hal-00927389>
  • Karima Boudaoud. International Cooperation for Trust. BIC Annual Forum 2012, Nov 2012, Lisbonne, Portugal. <http://www.bic-trust.eu/events/bic-forum-2012/>. <hal-01344081>
  • Karima Boudaoud. User Centricity. BIC Workshop on the Cross Domain Coordination of International Cooperation and Technical Themes in Trustworthy ICT and INCO, Jun 2012, Bruxelles, Belgium. <http://www.bic-trust.eu/events/bic-workshop-on-the-cross-domain-coordination-of-international-cooperation-day-1-and-technical-themes-in-trustworthy-ict-and-inco-day-2/>. <hal-01344077>
  • Christian Delettre, Karima Boudaoud, Michel Riveill. Cloud computing, security and data concealment. IEEE Symposium on Computers and Communications (ISCC), 2011, Jun 2011, Corfu, Greece. pp.424 - 431, 2011, <http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5975307>. <10.1109/ISCC.2011.5983874>. <hal-01342251>
  • Karima Boudaoud. A Human-oriented Vision to Security Management. "Network and Information Security : Research Ideas" Workshop, European Commission Emerging Technologies and infrastructures - Trust and Security, Sep 2011, Bruxelles, Belgium. <hal-01344071>
  • Karima Boudaoud. Human-oriented and Usable Security. 1st BIC Annual Forum, Nov 2011, Bruxelles, Belgium. <http://www.bic-trust.eu/events/1st-bic-annual-forum/>. <hal-01344075>

Rapport1 document

  • Yoann Bertrand, Mireille Blay-Fornarino, Karima Boudaoud, Michel Riveill. A model to reduce complexity and maintain coherence between Access Control and Transmission Control policies. [Research Report] I3S. 2016. <hal-01317109>

Autre publication1 document

  • Karima Boudaoud. eID and Security Glossary. Identity WG, Pole SCS, Sophia Antipolis, provided to the French Minister of Digital Economy and U.. 2012. <hal-01344086>

Direction d'ouvrage, Proceedings2 documents

  • Karima Boudaoud, Ludovic Me. SARSSI 2009 - Conference on Security in Network Architecture and Information Systems. Publibook Editions. France. 2009, SARSSI 2009. <hal-01344091>
  • Karima Boudaoud, Nicolas Nobelis, Thomas Nebe. 13th Annual Workshop of HP Openview University Association. May 2006, Presqu'ile de Giens, France. Infonomics-Consulting, Stuttgart, Germany, 2006, 13th Annual Workshop of HP Openview University Association. <hal-01344093>